Top jamf Alternatives

AirDroid

AirDroid

airdroid.com

AirDroid Business, an enterprise-grade Mobile Device Management(MDM) solution, is designed to help businesses manage and control fleets of Android and Windows devices from a central dashboard. With AirDroid Business, businesses can easily monitor device usage, deploy apps and updates, and remotely troubleshoot issues. It offers features such as kiosk mode, security policy, alerts & notifications, location tracking, file transfer in bulk, and more. It aims to simplify the device management process, increase productivity and efficiency, and reduce management costs. AirDroid Business MDM Highlights: *Multiple enrollment options - For Android: Zero-Touch, Android Enterprise(AE), Device Owner, and Regular Enrollment. For Windows: Regular Enrollment. *Unattended remote access *Batch operations *Tasks & Action logs *Patch management *Limit incoming & outgoing calls *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS):custom apps, Google Play Store apps and web apps *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications *Supports all Android-based endpoints *Devices fleet management from a centralized dashboard AirDroid Business's acclaimed MDM solution currently empowers organizations across 100+ countries. Our expertise spans various vertical markets such as retail, healthcare, digital signage, transportation & logistics, IT & MSP services, and education. We offer free trial, online demos, and email & call support to all prospects and customers, contact us for more information today!

NordPass

NordPass

nordpass.com

NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login. NordPass is a cross-platform application available on Windows, macOS, Linux, Android, and iOS. It also offers browser extensions on Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Safari.

Rippling

Rippling

rippling.com

Rippling gives businesses one place to run HR, IT, and Finance—globally. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system. Take onboarding, for example. With Rippling, you can hire a new employee anywhere in the world and set up their payroll, corporate card, computer, benefits, and even third-party apps like Slack and Microsoft 365—all within 90 seconds.

OneLogin

OneLogin

onelogin.com

OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that designs, develops, and sells a unified access management system (UAM) platform to enterprise-level businesses and organizations. Founded in 2009 by brothers Thomas Pedersen and Christian Pedersen, OneLogin is a late stage venture, privately held company.OneLogin was named a visionary in the Gartner Magic Quadrant for Access Management. The OneLogin UAM platform is an access management system that uses single sign-on (SSO) and a cloud directory to enable organizations to manage user access to on-premises and cloud applications. The platform also includes user provisioning, lifecycle management, and multi-factor authentication (MFA). OneLogin is based in San Francisco with a developer office in Redmond, Washington, as well as London and Guadalajara. The company hosts an annual Connect user conference.

Kandji

Kandji

kandji.io

We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way admins, end-users, and global teams work today and tomorrow.

JumpCloud

JumpCloud

jumpcloud.com

JumpCloud is a U.S.-based enterprise software company headquartered in Denver, Colorado. The company was formally launched in 2013 at TechCrunch Disrupt Battlefield as an automated server management tool. JumpCloud’s cloud based directory platform is used to securely manage users identity, devices, and access.

Prey

Prey

preyproject.com

DEVICE TRACKING & PROTECTION ON AUTO-PILOT. Knowing where your assets are at any given time is now crucial. Avoid information loss within your remote workforce using Prey's persistent device tracking & security solution.

WorkOS

WorkOS

workos.com

Your app, Enterprise Ready. Start selling to enterprise customers with just a few lines of code. Add Single Sign-On (and more) in minutes instead of months. WorkOS Dashboard - WorkOS provides an API for Single Sign-On (SSO), Directory Sync (SCIM), Audit Trail (SIEM), and more. Easily integrate Okta SAML, Google OAuth, and more.

CoreView

CoreView

coreview.com

CoreView is the Global Leader in Effortless M365 Security, Governance, and Administration. Offering an end-to-end solution that stretches across the whole M365 ecosystem; from your tenant level configurations, right up to your most critical workloads. M365 is your most critical cloud environment. Despite this, delivering best practice security, governance, and administration is complex work. CoreView makes it effortless. We give you a unified and simplified view of M365 with powerful security, governance, and administration tools and automations that make best practice effortless. Our offerings: - Policy Enforcement: 50+ OOTB security and governance policies to auto-detect and remediate issues in M365 - Configuration Management: Template and back up your M365 configurations, detect configuration drift, and effortlessly roll back to your ideal state - Delegation Management: Enable virtual tenant segmentation, configure least privilege roles in a few clicks, and delegate administration for M365 - No Code Task Automation: Create no code automated workflows for user onboarding, offboarding, and repetitive tasks - Unified Visibility & Control: Unify & simplify the admin user experience of M365 including multi-tenant and hybrid environments For more information, please visit www.coreview.com.

Applivery

Applivery

applivery.com

Applivery is the most powerful Unified Endpoint Management (UEM) platform that enables full control over Mobile App Distribution and Device Management (MDM & MAM), helping companies better manage their endpoints and mobile applications for Apple and Android devices.

Auth0

Auth0

auth0.com

Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.

Teleport

Teleport

goteleport.com

Teleport is the easiest, most secure way to access all your infrastructure. Faster. More Secure. Identity-Native Infrastructure Access. Teleport replaces the #1 source of data breaches — secrets — with true identity to deliver phishing-proof zero trust access for every engineer and service connected to your global infrastructure.

Indent

Indent

indent.com

With Indent, your team can quickly get the access they need to cloud apps and infrastructure when they need it. User-friendly access control - Indent provides team members with on-demand access to cloud apps and infrastructure in seconds, not days.

Kinde

Kinde

kinde.com

Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers – in one place. Every aspect of Kinde is designed to help your business grow and scale. We went to great lengths to make sure that you don’t have to worry about anything. From startup to IPO in a single platform. Authentication Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Our powerful builder allows you to make sure that your pages are on brand and as beautiful as the rest of your website and product experience. Up-level your security with multi-factor authentication (MFA). Give your users access to advanced authentication options, protecting them from reused or breached passwords. Take control of user authorization and access with enterprise SSO and custom SAML so that you can support your biggest customers as quickly as possible. Manage users from one beautiful dashboard. Add and invite users, manage roles and permissions, and get a complete picture of your user activity. We’ll keep you and your users safe. Kinde is built from the ground up using best-in-class security protocols. Access Control and Multi-tenancy Complex businesses need software that reflects their structure and restricts data access to only the people who should see it. That’s why we’ve included outrageously powerful controls to help you manage your businesses, teams, and users in the most frictionless way possible. Controlling who can access which individual pieces of data and interface is critical to protecting your business and your customers. Hierarchical role-based access control (RBAC) is the best way to manage this. Allowing strict control and flexible assignment – aligning everything from your business view of the world right down to the code you ship to customers. Feature flags Deliver new experiences and increase the speed that your team deploys, learns and releases with feature-based continuous deployment. Shipping to production introduces a degree of risk. Continuous deployment helps to reduce risk and accelerate learning by empowering the team to deploy when ready and separating releasing from shipping. Feature flags are the heart of what makes this work. Mistakes happen. Rollouts are no exception. The important thing is how your team deals with problems, and what tools they have at their disposal to manage problems. Feature flags are a powerful tool for preventing and managing failed change. Billing Coming in Q3, 2024.

Esper

Esper

esper.io

Esper enables next-gen device management for company-owned and managed iOS and Android tablets, kiosks, smart phones, IoT edge devices, and more. With Esper’s modern device platform, you can manage your entire multi-OS device fleet, increasing efficiency and managing all of your devices the way you want to. No more juggling, no more frustration—just a single pane of glass. Esper is on a relentless quest to redefine the landscape of device fleet management, and our vision is powered by innovation. We're not just another MDM platform; we're the catalyst for exceptional device experiences. In a world where company-owned and managed devices are revenue generators, lifesavers, and the face of customer interaction, "just working" isn't an option; it's a necessity.

CyberArk

CyberArk

cyberark.com

CyberArk is a leader in identity security and access management, dedicated to protecting organizations against cyber threats by securing identities, both human and machine. Key Features: * Identity Security Platform: Offers a comprehensive suite of tools to manage and secure user identities, including single sign-on (SSO), multi-factor authentication (MFA), and identity governance. * Privileged Access Management (PAM): Safeguards privileged accounts and sensitive credentials across various environments, ensuring secure access to critical systems. * CyberArk CORA AI: An advanced AI hub designed to enhance identity security by providing intelligent insights and automation capabilities. * Endpoint Privilege Security: Reduces attack surfaces by managing and controlling privileges on endpoints.

Scalefusion

Scalefusion

scalefusion.com

Scalefusion is a leading Mobile Device Management and Unified Endpoint Management vendor enabling ambitious companies around the world to secure and manage endpoints including smartphones, tablets, laptops, rugged devices, POS, and digital signages.

BetterCloud

BetterCloud

bettercloud.com

BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment. By streamlining and automating critical work like user lifecycle processes and day-to-day operations, BetterCloud's thousands of customers enjoy greater operational efficiency and employee productivity. With 10+ years experience pioneering the SaaS Operations movement, BetterCloud now serves the world’s largest community of SaaSOps experts. As host of Altitude, the industry’s leading SaaSOps event, and publisher of the annual State of SaaSOps Report, the category’s definitive market research, BetterCloud is recognized by customers (G2) and leading analyst firms (Gartner and Forrester) as the market leader in SaaS Operations Management. For IT teams that manage multi-SaaS environments, BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies. Unlike Identity & Access Management solutions that require manual intervention and custom scripting, or IT Service Desk solutions that generate tickets to be manually worked, BetterCloud’s granular, powerful automation and unlimited customizable workflows complement your IAM and help desk automation to improve IT efficiency by reducing up to 78% of SaaS management work. If your IT team is scripting or manually managing access to applications, files, folders, and groups for anyone joining, leaving, or moving inside your organization, you’re throwing talent and resources you can't spare at problems BetterCloud can automate. Headquartered in New York City, with a product and engineering office in Atlanta, GA as well as innovation hubs & remote talent across the U.S., BetterCloud is backed, among others, by some of the best technology investors including Vista Equity Partners, Warburg Pincus, Bain Capital, and Accel.

Palo Alto Networks

Palo Alto Networks

paloaltonetworks.com

Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud Architects & SOC Managers

GroWrk

GroWrk

growrk.com

Established in 2019, GroWrk specializes in providing comprehensive end-to-end IT equipment solutions tailored for distributed teams across more than 150 countries. Our innovative platform streamlines the entire process of device procurement, deployment, retrieval, and support, enabling companies to manage their global IT inventory from a single, user-friendly dashboard. This efficient approach ensures prompt and effective employee onboarding and equipment management, regardless of location.

Ivanti

Ivanti

ivanti.com

Ivanti breaks down barriers between IT and security so that #EverywhereWork can thrive. Ivanti has created the first purpose-built technology platform for CIOs and CISOs – giving IT and security teams comprehensive software solutions that scale with their organizations’ needs to enable, secure and elevate employees' experiences. The Ivanti platform is powered by Ivanti Neurons - a cloud-scale, intelligent hyper automation layer that enables proactive healing, user-friendly security across the organization, and provides an employee experience that delights users.

HiddenApp

HiddenApp

hiddenapp.com

HiddenApp protects Apple, Windows & Chromebook device fleets against theft & loss: enabling real-time location tracking, device monitoring, and advanced recovery tools, all actionable through a user-friendly dashboard. Key Features When a device goes missing, the consequences go beyond the cost of a replacement. HiddenApp's multi-layered approach offers preventive and proactive measures and tools to deal with device-related incidents, such as theft, loss or breach of policy. Prevent device loss HiddenApp’s proactive prevention and detection functionality is an early warning system that improves the chances of detecting and recovering missing devices. This early warning system includes a geofencing capability, which detects and reports when a device physically leaves an authorized location, and IP whitelisting, which detects and reports when a device is connected to an unauthorized network. Identify unauthorized users If you believe the device has been misplaced permanently, or possibly stolen, simply set the device to “missing’ on your HiddenApp dashboard. HiddenApp will get to work beaming in tracking data, as well as taking secret screenshots of what’s happening on-screen and iSight photos to capture the unauthorized user on camera, creating an audit trail that’s perfect for creating a strong evidence base. Of course, HiddenApp takes privacy seriously and has flexible privacy settings fitted as standard. This means that the tracking and investigative settings – location, network, photos, screenshots and keylogging – can each be enabled or disabled individually. Data gathered as a result of tracking can be permanently deleted, too. Track down missing devices with pinpoint accuracy HiddenApp’s ultra-accurate location tracking shows you the device’s exact real-time location on Google Maps. You can even track it to a physical address, as HiddenApp will discover and report the name of the network your device is connected to, and its proximity to the router. Send audio and written messages to devices HiddenApp’s messaging feature has a variety of applications, especially those that can lead to faster recovery of a device. Messages are totally customizable and have been used to give the finder of the device the owner’s contact details and, if appropriate, the tempting information that there’s a reward for its recovery. HiddenApp’s messaging function is a useful communications tool for sending out important notifications or emergency messages and has been especially useful to schools and colleges, which have used it to flag up reminders to students to return their devices at the end of a school year or lease period, or when they have changed school district. There’s also an option to send out bulk messages to the whole fleet, or just to particular groups. Supporting Compliance HiddenApp’s functionality can be an integral part of a robust information security management system, which you’ll need in order to demonstrate compliance with a range of regulatory or voluntary requirements. As well as keeping devices secure from theft and loss, HiddenApp helps to enforce corporate device-use policies, such as: > Location-based security policies, allowing operation in authorized zones only. > IP-based security policies, allowing connection to authorized networks only. > Its automated activity logging, reporting and device visibility provides a perfect audit trail to keep auditors happy.

Appdome

Appdome

appdome.com

Appdome is the mobile app economy’s one-stop shop for mobile app defense. Appdome provides the mobile industry’s only fully automated, Unified Mobile App Defense Platform, powered by a patented ML-coding engine, used by mobile brands to eliminate complexity, save money and deliver 300+ Certified Secure™ mobile app security, anti-malware, anti-fraud, MOBILEBot™ Defense, Geo Compliance, anti-cheat, MiTM attack prevention, code obfuscation and other protections in Android and iOS apps with ease, all inside the mobile DevOps and CI/CD pipeline. Appdome’s Unified Defense Platform also includes Threat-Events™ for UX/UI Control and ThreatScope™ Mobile XDR. Leading financial, healthcare, mobile games, retail, government and m-commerce brands use Appdome to protect Android and iOS apps, mobile customers and mobile businesses globally.

Heimdal

Heimdal

heimdalsecurity.com

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.

DoControl

DoControl

docontrol.io

DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution uncovers all SaaS users, 3rd party collaborators, assets/metadata, OAuth apps, groups, and activity events. From there, security teams can create granular data access control policies to reduce the risk of data overexposure and exfiltration. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data loss prevention (DLP) in SaaS. DoControl has no agents, no inline redirections, and no slow response times as commonly found in Cloud Access Security Broker (CASB) solutions.

AvePoint

AvePoint

avepoint.com

Collaborate with Confidence. AvePoint provides the most advanced platform to optimize SaaS operations and secure collaboration. Over 17,000 customers worldwide rely on our solutions to modernize the digital workplace across Microsoft, Google, Salesforce and other collaboration environments. AvePoint's global channel partner program includes over 3,500 managed service providers, value added resellers and systems integrators, with our solutions available in more than 100 cloud marketplaces. Founded in 2001, AvePoint is a five-time Global Microsoft Partner of the Year and headquartered in Jersey City, New Jersey.

FusionAuth

FusionAuth

fusionauth.io

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world.

Addigy

Addigy

addigy.com

Addigy is a cloud-based IT management platform for managing macOS, iOS, iPadOS and tvOS devices. Addigy is the only multi-tenant Apple device management solution designed for IT service providers and enterprise IT teams, offering zero-touch provisioning, asset management, automated monitoring and remediation, access to remote, software deployment, configuration management, and more.

Corrata

Corrata

corrata.com

Corrata is a cloud-based SaaS mobile data management software that uses advanced analytics to ensure you're always getting the best value from your mobile service provider and offers the enterprise visibility of their employees mobile data use and helps the employee manage their own data use inline with company policy

Redamp.io

Redamp.io

redamp.io

Redamp.io offers a revolutionary approach to digital safety, seamlessly protecting both mobile and desktop devices without compromising user privacy. By using Redamp.io's robust apps, users can shield their devices from cyber threats, ensure network safety, and stay updated on critical OS changes. Beyond digital safety, Redamp.io verifies physical device security through mechanisms like Touch ID and Face ID and monitors app safety on Android and iOS platforms. Furthermore, the platform provides administrative features that allow insights into network device security and facilitates communication about potential threats. Prioritizing user education, Redamp.io empowers its users by offering comprehensive security training, making them proactive against digital threats.

© 2025 WebCatalog, Inc.